CN1602611A - Lawful interception of end-to-end encrypted data traffic - Google Patents
Lawful interception of end-to-end encrypted data traffic Download PDFInfo
- Publication number
- CN1602611A CN1602611A CN02824452.4A CN02824452A CN1602611A CN 1602611 A CN1602611 A CN 1602611A CN 02824452 A CN02824452 A CN 02824452A CN 1602611 A CN1602611 A CN 1602611A
- Authority
- CN
- China
- Prior art keywords
- terminal
- key
- network
- node
- seed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A method of facilitating the lawful interception of an IP session between two or more terminals 12,13, wherein said session uses encryption to secure traffic. The method comprises storing a key allocated to at least one of said terminals 12,13 or to at least one of the subscribers using one of the terminals 12,13, at the terminal 12,13 and at a node 5,8 within a network 1,6 through which said session is conducted, or a node coupled to that network. Prior to the creation of said session, a seed value is exchanged between the terminal 12,13 at which the key is stored and said node 5,8. The key and the seed value are used at both the terminal 12,13 and the node 5,8 to generate a pre-master key. The pre-master key becomes known to each of the terminals 12,13 involved in the IP session and to the network node 5,8. The pre-master key is used, directly or indirectly, to encrypt and decrypt traffic associated with said IP session.
Description
Invention field
The present invention relates to be convenient to Lawful intercept for example is the method and apparatus of the datagram (Data traffic) of IP telecommunications (IP traffic).
Background technology
Can set up by the Internet now and comprise that data connection and voice are connected interior various the connection with video telephone.Along with the increase of the speed and the scope of the Internet, can expect and use the chance of voice and video telephone also can increase.Though current technology is also tended to IP multimedia session is limited in the terminal of receiving on the Internet, following technology will be provided at the IP multimedia session between each small, dedicated telephone terminal and other mobile devices such as PDA, palmtop computer.
Trust for such equipment is won generally, the key issue that must consider is fail safe.Deeply concerned is terminal related in avoiding illegal wiretapping and requiring authentication communication that two main (guarantee that promptly terminal that " user " is connected is that the user wants the terminal that connects, vice versa).Yet deeply concerned is not for these just concerning the IP multimedia, but many multi-form IP signal posts are common.There are some agreements to guarantee datagram safety with password and/or authentication.
Such security personnel's agreement is called IPsec (IETF RFC2401).For IPsec grouping can correctly be encapsulated and dismounting, must with security business be associated in the telecommunications that will send with as the key between the remote node of the predetermined recipient of telecommunications.Used for this reason structure is " security personnel related (Security Association, SA) ".Second kind of security personnel's agreement is called SRTP (security personnel's real-time protocol (RTP) (Secure Real-Time Protocol)), sees " draft-ietf-avt-srtp-02.txt ".Can expect that the third generation mobile network architecture that is called 3GPP will adopt SRTP as the agreement that guarantees IP multimedia telecommunication security.Certainly, the agreement of other such as IPsec also can be used for other mobile network architectures.
In internet draft " draft-ietf-msec-mikey-00.txt ", described a key managing project that is called multimedia internet key formation (MIKEY) and used for using in real time.This scheme is considered establishment and prerequisite master key (Pre-MasterKey, distribution PMK) of security personnel related (SA).(in fact, MIKEY is designated as these keys " TEK produces key ", but PMK is a more general term, will use throughout, because use of the present invention is not limited to MIKEY.) PMK is used for drawing a telecipher key (TEK) for each secure session.Specifically, TEK imports with the key of the selected security personnel's agreement (being SRTP) of opposing.
Summary of the invention
Traditional circuit exchanging telephone net has been taked measure for the Lawful intercept call.Intercepting like this must be instigated by competent department, is the important means of antagonism swindle and other crimes.Be appreciated that desirable is to provide convenience for Lawful intercept IP session (no matter whether being clear data, VoIP, video etc.).Yet this has a potential problem, because the IP security personnel agreement of using has been designed to provide the security measures of the terminal-to-terminal service that relates to strong encryption.
If carry out an agreement such as the MIKEY draft, security personnel's mechanism will depend on the prerequisite master key of deciding through consultation IP session side (PMK).PMK can be proposed by the initiator of session, is accepted (or refusal) by answer party, also can be used in the value that exchanges between the session each side and produce.Decide through consultation that PMK forms the part of IP multimedia key management functions.After PMK decides through consultation, the multimedia key management functions can be encrypted PMK with a privacy key (secret key) of sharing with answer party or with the public-key cryptography (public key) of answer party, perhaps the initiator can calculate the power of a Diffie-Hellman mould, to obtain PMK.Can see that in order to intercept the telecommunications with session association, the third party must know PMK.
The objective of the invention is to be convenient to one of Lawful intercept needs session each side to decide through consultation the IP session that a PMK uses for the telecommunication security that guarantees to send by session.
According to a first aspect of the present invention, a kind of method of being convenient to the data session between two or more terminals of Lawful intercept is provided, wherein said session guarantees telecommunication security with encrypting, described method comprises the following steps:
The key of at least one terminal in the described terminal of dispensing is stored in this terminal and is stored in a node that makes in the net that described session carried out or a node that is connected with this net;
Before the session of setting up between these terminals, between the terminal of storage key and described node, exchange seed (seed value);
Produce a prerequisite master key in this terminal with key and seed, wherein said prerequisite master key also becomes known for each related in this terminal or data session other-end; And
With described prerequisite master key directly or indirectly to the telecipher and the deciphering of described session association.
According to a second aspect of the present invention, a kind of method that guarantees the data security that sends between a plurality of terminals is provided, each terminal is respectively received on the communication network, and at least one terminal in these terminals is furnished with a home network (home network), and this method comprises the following steps:
Send a seed by the respective communication net to described at least one terminal from home network, as the part of a call signaling level authentication procedure (call signalling levelauthentication); And
Described at least one terminal produce with described seed one or more telecipher keys for to terminal between the related telecommunications of calling carry out End to End Encryption and use.
This method preferably comprises a privacy key is stored in described portable terminal and being stored in the home network, and this key sent to described mobile network for using from home network described authentication procedure, this key also is used for producing described telecipher key by wireless terminal.The step that produces one or more telecipher keys comprises the cipher key change program of carrying out between each terminal.
Preferably, with session initiation protocol set up and control terminal between calling, and this method comprises described random value is sent to portable terminal from the P-CSCF node of described home network by described mobile network.More preferably, described call signaling level authentication procedure is an IMS AKA program.
Preferably, this method also comprises described random value is transmitted to Lawful intercept organ of power, makes it to calculate the telecipher key, is decrypted thereby the telecommunications of encrypting can be transmitted to organ of power behind a call setup.
In appended claims, give some other situation of the present invention and desirable characteristic.
Description of drawings
Fig. 1 principle ground illustration make the communication network that can set up the IP session between two portable terminals;
Fig. 2 show between the portable terminal of Fig. 1 and a net node, exchange with establish the signaling that shared privacy key is relevant;
Fig. 3 intercepts the flow chart of the method for IP session for illustration;
Fig. 4 illustration the signaling relevant with Diffie-Hellman exchange;
Fig. 5 illustration the web frame of UE to visit net registration;
Fig. 6 illustration the AKA agreement;
Fig. 7 illustration with authentication and the module of the relevant UE that ensures public security;
Fig. 8 illustration setting up the step of SIP in calling out; And
Fig. 9 at length illustration setting up two steps among the SIP that receives between the online user of different 3G.
Embodiment
The illustrated communication system of Fig. 1 comprises first mobile radio communication 1, is assumed to be a 3GPP (or UMTS) net for this explanation.In 3GPP net 1 is 2 and GPRS nets 3 of a UMTS terrestrial radio Access Network (UTRAN).The GPRS net comprises one or more Serving GPRS Support Nodes (SGSN) 4 and one or more Gateway GPRS Support Node (GGSN) 5.The responsibility of SGSN 4 is the position of subscriber equipment (UE) in maintain subscription data (identification number and address) and the tracking network.The responsibility of GGSN 5 is the IP address of maintain subscription information and dispensing, and follows the tracks of the SGSN 4 that UE connect.Net 1 also contains some customer data bases, and for example HSS or AuC/HLR 14 are used for safeguarding relevant user's subscription information, the cipher key application information that is used to ensure public security etc.
Fig. 1 also illustration second mobile radio communication 6, also being assumed to be is a 3GPP net.This net also comprises some SGSN 7 and the GGSN 8 of a part that forms a GPRS net 9, and a UTRAN 10.GGSN 5,8 receives on the IP network 11.UE 12,13 receives respectively on first and second nets 1,6.3GPP has been for UE provides a kind of " all the time connect " service, makes UE so long as registered this service to a net (home network or visit net), and they just can be assigned to the IP address, thereby can receive and send data and do not need to connect.Available call setup agreement, for example (Session Initiation Protocol SIP), sets up the Multimedia session between two UE 12,13 of Fig. 1 to session initiation protocol.(SIP will be described in detail after a while.Set up session as long as know available SIP here by " invitation " other user's participant sessions.) in GPRS net 3,9, be the strategy that GGSN 5,8 realizes network operator, for example which user can obtain which kind of service, user's priority etc.
Usually, when the operator of a 3GPP net was registered, he obtained a Subscriber Identity Module (SIM) card, has a unique IMSI International Mobile Subscriber Identity (IMSI) code above a user.Except that IMSI, here advise a privacy key k also is stored on the SIM card.This key has only network operator and user's (exactly being user's SIM card) to know, and a copy of this key is stored in the customer data base (SDB) 14 of the HSS of user's the home network for example of attaching troops to a unit or HLR/AuC.Be stored on user's the SIM card pseudo-random function in addition in (perhaps being stored in user's the memory of UE) and the SDB 14, key formation hash such as SHA-1 or MD5 or 3GPPMilenage algorithm (seeing 3GPP TS 35.205-35.209) (or MAC, message authentication code) and so on.
Owing to reason above-mentioned, may need the IP session between two UE 12,13 is intercepted.The situation of intercepting execution is as follows.
Suppose that session is by a UE 12 initiations.UE 12 sends an invitation message by the GGSN 5 that it connect.This invitation message has marked initiation UE 12 and response UE (being UE 13 in this case).In this stage, session initiation is in wait state, and database 14 is checked, and determines whether it has the key of initiating UE 12.If there is not key in database 14, session initiation does not just allow to continue, so can return to 12 1 notification messages of UE.On the other hand, if there is the key of UE 12, SDB 14 just produces a random number or " disposable number (nonce) " returns to UE 12 by GGSN 5.This disposable number provides a seed (seed value) for further calculating.Disposable number does not need security personnel to be transferred to UE 12 (promptly encrypting).Then, UE 12 and SDB 14 both sides are by calculating a prerequisite master key (PMK) k_m to cipher key shared and disposable number application pseudo-random function, promptly
k_m=PRF(k,nonce)
After having determined PMK, GGSN 5 just sends invitation message to the home network 6 of response UE 13 by " IP Multimedia System " 15, the 16 operator operation of mobile network 1,6 (respectively by).The GGSN 8 that response UE 13 passes through to be connect receives invitation message.Suppose response UE 13 request of setting up of being ready to accept session, so the stage 1 of IKE (for example be MIKEY) begins.This requires UE 12 to send the PMK that it is determined with SDB 14 to UE 13.The privacy key that PMK can share with UE 12,13 or with the public key encryption (SRTP does not stipulate how to exchange or to consult PMK, and it only requires that common secret PMK is necessary for known to the each side, for example by utilizing MIKEY) of response UE 13.No matter be which kind of situation, the result is that the SDB 14 that UE 12,13 and initiation UE 12 are connect knows PMK when the stage 1 finishes.
In the stage 2 of IKE, the PMK that UE 12,13 usefulness are shared produces a telecipher key (TEK).In the MIKEY draft of mentioning related program has been proposed in the above.Know owing to calculate required algorithm and parameter (the comprising PMK) SDB 14 of TEK, so SDB can calculate TEK.In case produced TEK, just can begin the IP session.Telecommunications is used for example SRTP encryption and decryption in the UE 12,13 that uses this TEK.In some cases, can produce a pair of TEK in the stage 2 of IKE, one of them TEK is used for to the telecipher on the direction and another TEK is used for to the telecipher on the rightabout.
As can be seen, will pass through GGSN 5 all the time with the IP telecommunications of session association.Thereby GGSN 5 can intercept telecommunications, if obtain these keys from SDB 14, with regard to available TEK it is deciphered.Then, the telecommunications through deciphering can be sent to governmental power mechanism such as the police.Perhaps, also can be that the net operator is given to governmental power mechanism with TEK during session is set up.Intercept at GGSN 5 places telecommunications therefore directly transmit governmental power mechanism, governmental power mechanism can decipher telecommunications with the TEK that had before received.
Fig. 2 illustration produce the signaling relevant with PMK with switching phase.Fig. 3 is the flow chart of this mechanism of further illustration.Be appreciated that if ratify Lawful intercept is carried out in this IP session also just GGSN can obtain TEK.
Can between some governments and net operator, hold consultation, make a governmental power mechanism can intercept the IP session of initiating at an extraneous UE of interested government power.In this case, the PMK that the node at extranets can be produced sends to the net under this interested government power administration from these extranets.Can intercept the IP session with PMK then.
Though abovely describe, invention is not to be considered as being limited to mobile network with regard to UE and mobile network.The present invention also be applicable to the IP session of carrying out between the terminal of receiving on online and other wireless networks of fixed line and receiving dissimilar online terminals (for example one be portable terminal and another is the fixed line terminal) between the IP session carried out.The present invention can be used to be connected on the same Access Network UE be connected to different Access Networks on UE.
In a kind of modification of said procedure, can with a kind of such as data encryption standard (DES) or Advanced Encryption Standard (AES) encryption function rather than produce PMK with pseudo-random function according to disposable number and shared secret key.In another modification, can be with the part of shared secret key or its modified model rather than with whole shared secret key k generation PMK.In another modification, TEK draws by one or more intermediate cryptographic keys from PMK.
The personnel that are familiar with this technical field can see, can carry out various modifications to the embodiment of above explanation under the situation that does not deviate from scope of patent protection of the present invention.For example, can produce PMK, rather than produce PMK by initiating UE with the exchange of the Diffie-Hellman between the UE that participates in.
If (G *) is an abelian group.G in natural number x and the G establishes
g^x=g*g*...*g
(the x power of g).This problem of y=g^x is calculated in consideration when given g and x.According to " binary system " method, this can realize with log_2 (x) group's operation (" multiplying each other " and " involution ").Consider now given y (=g^x) and ask the inversion problem of x under the situation of g.This is called (dispersing) logarithm problem.If (G *) is included in real number multiplication under to the group, and logarithm almost resembles easy calculating the calculating g^x itself.Yet, sometimes, for example in that (G *) is
Under multiplication to the integer of the mould of a suitable prime number p
2. the point on the suitable elliptic curve of next bar of addition,
The time, for the logarithm problem still do not know to have assorted petty high efficiency algorithm (running time of best universal method roughly with | G|^ (1/2) is directly proportional, wherein | G| estimates for the group's), though " forward exponentiation " remain that high efficiency calculates.
Be rendered as ticklishly based on discrete logarithm problem, Diffie-Hellman adopts following key to decide through consultation method.If (G is such one " firmly " group *), and establishing g again is the appointment unit of G.Below with two terminal UE
AAnd UE
BFor example in Fig. 4 illustration the situation of this agreement.(note by interchangeability: yB^xA=(g^xB) ^xA=(g^xA) ^xB=yA^xB.) result of Diffie-Hellinan exchange is a shared secret key k that PMK is provided.
In fact, owing to security personnel's reason, can directly not encrypt telecommunications, but draw certain Traffic encryption key(TEK) (TEK) (for example by getting the hash of PMK) from PMK k with k.For complete security personnel, UE
AAnd UE
BNo matter will need mutual authentication, be with the shared secret key of previously known or with digital signature and certificate.
Disposable number exchange and Diffie-Hellman exchange between integrated use net and the UE just can obtain a kind of reliable mechanism that obtains the shared secret key, and this mechanism allows to carry out Lawful intercept.This relates to from SDB to initiating disposable number of UE transmission.UE and SDB both sides are to this disposable number and shared secret cipher key application pseudo-random function, generation value x.UE is according to x the power of g^x generation value g, and wherein g is a non-secret value, is known for the UE that participates in communication with for SDB at least.The value that calculates (first interaction parameter) sends to response UE.After response UE receives a disposable number from the SDB that it connected, just produce a shared secret key y, calculate g^y (second interaction parameter) again, it is returned to initiate UE with it.So both sides calculate PMK according to k_m=g^ (xy).During this process, node such as GGSN can be intercepted and captured or " discovery " issues the value g^y that initiates UE from response UE.As long as GGSN has known the value (for example, being that SDB gives it) of x, it just also can calculate PMK.This can decipher GGSN to telecommunications.In addition, in a preferred alternative, GGSN just is given to the center of intercepting with telecommunications, and key is given to the center of intercepting in addition, at the center of intercepting telecommunications is deciphered.
Be appreciated that at UE to be roamed into from its home network (being the net that UE contracts) under the situation of the area of coverage of a visit net that privacy key k is known for UE and its home network just referring to Fig. 5.In order to ensure public security, preferably key k does not allow the visit net know.Yet, still can carry out Lawful intercept to the UE in the visit net.In this case, disposable number can send to UE by the visit net from home network.Simultaneously, home network calculates PMK, and it is sent to the visit net.Therefore, the visit net can be to the telecommunications deciphering of encrypting with PMK (the perhaps TEK that draws from PMK).Under the situation that adopts the Diffie-Hellman exchange, the visit net obtains the value x that home network sends, and can the value of listening to g^y, visits net and can calculate PMK{g^ (xy) thereby make }.
3G (UMTS) cellular standards supports authentication and the key between portable terminal (UE) and the net (radio network controller (RNC) node) to decide through consultation.One of this agreement is called authentication and key and decides through consultation that the part of (AKA) agreement is used for determining the key of the telecommunications that link between a protection UE and the RNC is interior.Yet the agreement of this prior art is not considered to guarantee the safety of telecommunications outside this link with this key or key that some draw from this key.Here propose to guarantee the end-to-end i.e. safety from the user terminal to the user terminal of telecommunications with key.
The working condition of AKA is as follows.The home network shared secret key k of mobile terminal UE and it (be stored on the SIM card of UE and the SDB that is stored in operator is in HSS or the HLR/AuC).Receive a visit when online at UE, this visit net is to " quintet " of being made up of five values of home network request.Related here just wherein three values, rand, XRES and k
cValue rand is a random value that produces with home network.Value k
cCan equal privacy key x, by to privacy key k
iUse key derivative function KDF with random value rand and (normally use k for one
iBlock encryption function as key) draws, i.e. k
c=KDF (k
i, rand).XRES is drawn by home network, is XRES=f (k
i, rand), wherein function f is generally a disclosed known function.
The visit net will be worth rand and be transmitted to UE.Therefore UE knows function f and KDF, can calculate kc and RES as a result.Value RES returns to the visit net, compares with value XRES there.Suppose XRES=RES, the visit net has just confirmed that UE is credible.Other of wishing to communicate by letter with it for the terminal of at first mentioning are received a portable terminal that visit is online, will carry out similar program.Utilize the Diffie-Hellman exchange, both sides' terminal just can be known this PMK.Because the visit net can be found g^k
C (A or B), it also just can draw PMK (g^
Kc (a or B)k
C (B or A)).The visit net also can authenticate a terminal and be to use the key k that decides through consultation
cRather than attempt to play tricks with other self-generating keys.The further illustration of Fig. 6 the AKA agreement, though Fig. 7 illustration these modules that are used for supporting AKA and IKE that in UE, realize, the dotted line in Fig. 7 has indicated at one and has been used for improving the assembly that should contain in anti-the altering " module " of fail safe.
Illustrated mechanism has supposed that the visit net is believable in the last paragraph.If situation is not like this, a solution is to allow portable terminal to produce a key k
c'=KDF2 (k
i, rand), wherein KDF2 be on the password with KDF another key derivative function independently.The independence of KDF and KDF2 can realize with diverse function, can be a block encryption KDF (k also at first function, r)=E (k, r) obtain second function with a simple conversion under the situation, for example KDR2=E (k XORm is arranged for certain fixing bit mask m, r) (certainly, also have other alternative solutions).These two keys that in the Diffie-Hellman exchange, use portable terminal to produce.Because the visit net is not also known KDF2, so they can not draw key k
C ' (A and B)Carry out Lawful intercept at a visit net if desired, can be with the privacy key k of a terminal
c' send to this visit net from the home network of this terminal.Lawful intercept can be carried out in home network, as long as the visit net at first provides the value g^k that is found to home network
c, then again the telecommunications of encrypting is transmitted to home network.
Adopt this mechanism, a visit net can not be with the privacy key k that decides through consultation
c' confirm that a terminal is certain.This is easy to the value g^k by allowing the exchange of visit net to find
C (A and B)The value that will send is compared with the value that should send and is remedied again.This does not still make a visit net at first not receive key k from home network
c' situation under can intercept telecommunications.
As the personnel that are familiar with this technical field can see, can also do further modification to top illustrated embodiment.For example, available MTI, platform are decided through consultation PMK to platform agreement etc. rather than Diffie-Hellman between portable terminal.Use the modification of property in many ways of IKE, multiple terminals teleconference that can organization security.
Among the illustrated embodiment, supposed that privacy key k and pseudo-random function PRF are stored on user's the SIM card in the above.Along with SIM card is improved,, therefore might the whole process that produces PMK will on SIM card, finish comprising disposal ability to a certain degree.
For further illustration the present invention, will describe another embodiment below.This embodiment uses the present invention on SIP (application) level, can for example use under the situation of user's IP multimedia communication the user.This example is based on current 3GPP standard, but very clear being not limited thereto.Suppose that these UE that wish foundation security personnel session register to visit net separately, with access network.This will relate to usually carries out the AKA program between UE and GGSN separately and home network.The 2nd AKA program that is called IMS AKA (seeing IETF RFC3310) is used in the SIP level UE being authenticated.The present invention has utilized the mode can not introduce extra signaling traffic load of IMS AKA program to produce the advantage of session key.
Done introduction above the session initiation protocol (SIP).Yet more detailed again explanation may be useful.The following abbreviation of this explanation:
CSCF call server controlled function (Call Server Control Function)
CN core net (Core Network)
HTTP hypertext transport protocol (Hyper Text Transport Protocol)
IMPI IMS specific identity number (IMS Private Identity)
IMS IP Multimedia System (IP Multimedia Subsystem)
The SEG gateway (Security Gateway) of ensuring public security
SDP Session Description Protocol (Session Description Protocol)
SIP session initiation protocol (Session Initiation Protocol)
The SADB linked database (Security Association Database) of ensuring public security
The SPD policy database (Security Policy Database) of ensuring public security
UAC user agent client (User Agent Client)
UAS subscriber proxy server (User Agent Server)
SIP is the control protocol that can initiate, stop and revise Multimedia session, specifies in " IETFRFC 2543 (1999) SIP: session initiation protocol ".Multimedia session comprises for example voice call, video conference, streamer and chat.Generally be that Session Description Protocol (SDP) (seeing " IETF RFC 2327 (1998) SDP: Session Description Protocol ") uses in conjunction with SIP, need the coding decoder of usefulness with clear and definite session and negotiation.Can connect a user with different IP addresses (being terminal), this depends on registration process.In registration process, user's sign-on ID number and corresponding IP address.
SIP works in a similar fashion based on HTTP, and promptly it is based on client-server model.Therefore, entity or send request as a client computer perhaps sends response as a server.Sip event has triggered in request and has taken place when a response and client computer receive this response.
When using SIP, to use many different entities.These entities are:
The user agent
User agent and customer interaction are for example when the user invites (foundation) and the opposing party's audio call.A user agent can be a client computer or server, and this depends on that it is to initiate request or return response.
Acting server
Acting server can be (the Call Stateful) of call state monitoring, (Transaction Stateful) or (Stateless) of stateless monitoring of transaction status monitoring.The agency of a stateless monitoring does not store any state, and promptly it is only transmitted request and can carry out Route Selection for response according to the path leader.The agency of a call state monitoring begins the store status parameter from the session that starts with INVITE, up to conversation end.Such agency can measure the length of calling.Notice that all sip messages subsequently all will be by the agency of a call state monitoring in a specific session.The agency of transaction status monitoring, the agency of branch (Forking proxy) for example, storage only with a parameter that specific affairs are relevant, promptly store this affairs always into and finish.
The agency of branch(Forking Proxy)
The agency of branch is a sip agent, can attempt some different position candidate for an INVITE, and this can finish in the serial or parallel mode.
Redirect Server(Redirect Server)
Redirect Server can have the information of some different contact addresses that can contact with a specific user.If a calling party has tried a friend's public address, calling party's UA will receive the some different candidate site that this friend may be in from Redirect Server.So calling party's UA can attempt all these candidate sites.
Register
Register is accepted registration, i.e. SIP registration.A sip user can be told Register with in which address contacting with this user.
Definition has six different " mechanism " to be included in the request in SIP.These mechanism are:
INVITE(invitation)
INVITE sends to other users or the server that this user wishes to set up with it session (for example video conference or streamer) from a user.
ACK(affirmation)
SIP has used a kind of three journeys for INVITE shake hands (three-way handshake).This is the unique method as three journeys, and every other method all is a round trip.This allows to use the agency of branch.In addition, it has also been considered owing to different reasons may will be expended the considerable time by invited party before actual accepting the invitation.Initiate the user and when the invited user call accepted, send ACK.At this moment, all interested parties to have examined INVITE still effective.
OPTIONS(option)
OPTIONS is used for identifying the ability of a server, and for example which method it supports.
BYE(goodbye)
In the time will stopping a session, just send a BYE.
CANCEL(cancelling)
A user may send INVITE to another user.Before returning ACK, send the user who invites and to stop this affairs owing to different reasons with CANCEL.
REGISTER(registration)
The user can send a REGISTER to a Register, with the IP address notification server that can contact with this user.
Fig. 8 illustration set up the program of " calling " with SIP.In this case, play the UA transmission INVITE that will play server or UAS effect of the user agent of client computer or UAC effect to a friend.UAC sends INVITE (1) to acting server SIP, and acting server will be communicated by letter (2) with a dns server, so that find out the address of next hop.Acting server is transmitted SIP INVITE (3), and at this time acting server need be communicated by letter (4) with a location server, so that find out recipient's IP address, and then transmits INVITE (5).Subscriber proxy server will be beamed back response to UAC, and response has sentence structure 180 RINGING (ring) in SIP.So UAC knows message and is received by UAS.In this case, UAC can determine end call, for example drags too for a long time owing to UAS replys.At that rate, UAC sends SIP CANCEL to the UAS with SIP 200 OK response.If the user determines answering call, UAS just postbacks SIP 200OK, so UAC will send SIP ACK to UAS, expression is called out and remained up-to-date.Note having some packet loss, therefore this ACK mechanism is essential.Here it is, and so-called three journeys are shaken hands.Now, for example use RTP to begin session according to defined in " IETF RFC 1889 (1996) RTP: use transportation protocol in real time ".(notice that Session Initiation Protocol is experiencing some important changes, for example reflects some 3GPP requirements, can be referring to " IETF RFC 2543bis-09 (2002) SIP: session initiation protocol ".
3GPP IMS is a CN in the UMTS, based on SIP.Relevant with SIP in IMS have four entities:
UE (subscriber equipment) contains UA
P-CSCF plays a part an outbound proxy.This is first contact point of the UA in the UE that is in the visit net.It transmits the SIP request to I-CSCF.Attention: if GGSN resides in the home network, P-CSCF is just also in home network.
This is contact point in home network for I-CSCF, plays a part a sip agent.It transmits SIP request or response to S-CSCF.
This can be equivalent to Register, acting server and a UA S-CSCF.Before UE can send INVITE, it must at first successfully register a disclosed identification number or IMPU.Registering an IMPU finishes to home network transmission REGISTER by UE.HN issues an inquiry (challenge) to UE.The identification number that obtains authenticating is specific identity number or IMPI, and authentication is carried out by S-CSCF.
Fig. 9 illustration send the situation of INVIIE from a UE to another UE, these two UE reside in the 3GPP net.
For first and last hop (between UE and P-CSCF), by in that " 3GTS 33.203: third generation partnership project (3GPP); Technical specification group (TSG) SA3; The access security of IP-based service, (version 5) " in such IPsec ESP that uses of defined.(note: this protection is for the SIP signaling, rather than for actual user's communication.) sensitive data will exchange between visit net and home network with Session Initiation Protocol.Therefore require mid-level net SIP signaling to protect with SEG.
Key management
The session key of integrity protection draws from IMS AKA program.When UE sends a unshielded REGISTER message, receive home network (HN) after this message, promptly S-CSCF just issues an inquiry to UE.This sip message that contains inquiry comprises the session key that is fit to P-CSCF, and UE draws identical session key according to this inquiry.This program relates to as mentioned above to P-CSCF transmission rand, XRES and k
cParameter and transmit the rand parameter to UE.
IKE
IKE is used for consulting to protect the IPsec SA of the SIP signaling between visit net and the home network.
Remember that importantly just the SIP signaling is by IMS (CSCF node), the actual user data payload will send by common GPRS (GGSN) net by an agreement carrying as RTP.Therefore, key management (for example MIKEY) will be the part of SIP signaling in the IMS usually, and actual safety measure (for example SRTP) is used for passing through the grouping that another path sends in whole GPRS net.
Utilize the above introduction that the IP multimedia call is set up, the following describes the exemplary manner that available the present invention intercepts the IP multimedia communication of the 3GPP standard of deferring to that obtains end-to-end protection (for example using SRTP).For simplicity, suppose to adopt between the user Diffie-Hellman key to decide through consultation (for example using MIKEY), the personnel that are familiar with this technical field certainly know that it equally also is operable that the additive method (using the method for prerequisite shared key or public-key cryptography) that illustrates is previously done after the corresponding modify.
As mentioned above, when a user A execution SIP registration, he will draw the key k of the SIP signaling between the interior P-CSCF of a protection he and visit net.Utilize k, can draw key and form data x (for example, in the simplest form, establishing x=k).User A gives user B with g^x as his Diffie-Hellman value transmission (for example being used as the MIKEY of the part of a SIP/SDP message) now on call setup.Similar, user B obtains key y, postbacks g^y in a similar fashion.Net separately can carry out Lawful intercept with the g^y (or g^x) of known index x (or y) and " discovery " now, corresponding key is formed data (for example from the x of P-CSCF with from the g^y of GGSN) is transmitted to and intercepts a little, again with the telecommunications (encrypted) of reality from it the GGSN node of process be transmitted to and intercept a little.Note,, do not need to change existing standardized communication interface if the present invention uses with 3GPP IMS standard.
Certainly, as the personnel that are familiar with this technical field are easy to see, also available here all before mentioned expansion, for example adopt secondary key to derive KDF2, intercept only to allow home network to carry out.
Claims (35)
1. method of being convenient to the data session between two or more terminals of Lawful intercept, wherein said session guarantees telecommunication security with encrypting, described method comprises the following steps:
The key of at least one terminal in the described terminal of dispensing is stored in this terminal and is stored in a node that makes in the network that described session carried out or a node that is connected with this network;
Before the session of setting up between these terminals, seed of exchange between the terminal of storage key and described node;
Produce a prerequisite master key in terminal with key and seed, wherein said prerequisite master key also becomes known for each related in this terminal or data session other-end; And
With described prerequisite master key directly or indirectly to the telecipher and the deciphering of described session association.
2. the process of claim 1 wherein that described node produces prerequisite master key, use for the Lawful intercept data session.
3. claim 1 or 2 method, the wherein said step that produces prerequisite master key with key and seed in terminal comprise with a cipher key change program one first interaction parameter are sent to another terminal and one second interaction parameter is sent to described at least one terminal from this another terminal from described at least one terminal.
4. the method for claim 3, wherein said cipher key change program are the Diffie-Hellman exchanges.
5. the method for claim 4, described method comprise that also described key and seed are used a key derivative function draws one second key, produces a power of described second key, again for use in the Diffie-Hellman exchange.
6. the method for any one claim in the above claim is wherein saidly carried out in the time will setting up a new data session in exchange seed between terminal and the net node and the step that produces prerequisite master key at every turn.
7. the method for claim 6, wherein said between terminal and net node exchange seed and the step that produces prerequisite master key no matter whether need to give Lawful intercept for each data session execution.
8. the method for any one claim in the above claim, wherein said prerequisite master key is used for producing one or more telecipher keys by terminal related in the data session, and these telecipher keys are used for to the telecipher related with data session.
9. the method for any one claim in the above claim, wherein said node are nodes of the signatory with it home network of the user of described at least one terminal.
10. the method for claim 9, wherein said at least one terminal is connected on the extranets, and described seed sends to terminal by these extranets.
11. the method for claim 10, when accessory claim 5, the node that also is included in described home network produces second key, and this key is sent to extranets with seed, and seed rather than described second key are sent to terminal.
12. the method for any one claim in the above claim, wherein said data session are IP data sessions.
13. method of intercepting a data session of setting up with the method for any one claim in the above claim, described method is included in described node and produces prerequisite master key, and directly or indirectly data is deciphered with prerequisite master key at this node or another node that receives prerequisite master key.
14. the method for claim 13, when accessory claim 4, described method also is included in described node or sends to the power of one second key of described at least one terminal from a reciprocity terminal in another node detection that session telecommunications is passed through between the Diffie-Hellman commutation period, and produces prerequisite master key with second key of described at least one terminal of sum of powers of detected second key.
15. a line module that is used for communication terminal, described module comprises:
Memory allocation is given the memory of a user's who uses this terminal a key;
Before a data session of setting up between the communication terminal described module and one make communication network that the enciphered data session carried out node or with a node that this net is connected between exchange the device of a seed;
Produce a device that also becomes known prerequisite master key for each related in this terminal or data session other-end with key and seed; And
With prerequisite master key directly or indirectly to the telecipher of described session association and the device of deciphering.
16. one kind be used to intercept with receive a communication network on two or more terminals between the network node of the related encryption telecommunications of the data session that carries out, described node comprises:
Memory allocation is given terminal or to the memory of the user's of described net registration key;
Before a data session of setting up between the terminal with the device of terminal switch seed; And
Produce a prerequisite master key or key and seed sent to key and seed and have the device of another node that produces the device of a prerequisite master key with key and seed.
At least one terminal in the described terminal is a vehicular radio 17. a method of being convenient to the data session between two or more terminals of Lawful intercept, wherein said session are with encrypting the assurance telecommunication security, and described method comprises:
A key of distributing to described at least one terminal or user is stored in a node in the home network of this terminal and this terminal/subscriber;
With described key terminal/subscriber is authenticated during in terminal/subscriber to the registration of home network and/or one visit net; And
With key and a seed that sends to terminal from home network to the telecommunications End to End Encryption during described data session.
18. the method for claim 17, wherein said step with the key authentication terminal/subscriber uses authentication and key to decide through consultation the AKA agreement, and this agreement also guarantees the data security that sends with key on a radio link.
19. the method for claim 17 or 18, wherein said step with the key authentication terminal/subscriber is included in described node and produces a challenge value and produce a response at portable terminal with key, challenge value is compared with response, only when these two value couplings, prove that just terminal/subscriber is credible.
20. the method for any one claim in the claim 17 to 19, wherein saidly the step of telecommunications End to End Encryption is included in the used for mobile terminal seed and the key at first mentioned produces one second key, and carries out Diffie-Hellman with described second key and exchange with key and the seed that sends to terminal from home network.
21. the method for any one claim in the claim 17 to 20, described method also comprises key and seed is sent to a Lawful intercept organ of power, the user's telecommunications that wherein need intercept is transmitted to Lawful intercept organ of power from Access Network, and organ of power can the telecommunications deciphering to being transmitted with key that receives and seed.
Find one or more and the related parameter of the IKE between the described terminal in Access Network 22. the method for claim 21, described method also comprise, and these parameters are transmitted to Lawful intercept organ of power with described key and seed.
23. one kind guarantees the method for respectively receiving the data security that wherein sends between the terminal of at least one home network of attaching troops to a unit on the communication network a plurality of, described method comprises the following steps:
Send a seed by the respective communication net to described at least one terminal from home network, as the part of call signaling level authentication procedure; And
Produce one or more telecipher keys in described at least one terminal with described seed, for to terminal between the related telecommunications of calling carry out End to End Encryption and use.
24. the method for claim 23, wherein said at least one terminal are to receive a mobile radio terminal that mobile communication is online.
25. the method for claim 23 or 24, described method comprises a privacy key is stored in described at least one terminal and the home network, and this key or a key that from then on draws sent to described communication network from home network, for using in described authentication procedure, the key that is sent also is used for producing described telecipher key by wireless terminal.
26. the method for claim 25, the step of the one or more telecipher keys of wherein said generation comprise the cipher key change program of execution between these terminals.
27. the method for any one claim in the claim 23 to 26, wherein set up with session initiation protocol and control terminal between calling.
28. the method for claim 27, described method also comprise described seed is sent to described at least one terminal from S-CSCF node of described home network through a P-CSCF node of described communication network.
29. the method for claim 28, wherein said call signaling level authentication procedure is an IMSAKA program.
30. the method for any one claim in the claim 23 to 29, described method also comprises described seed is transmitted to a Lawful intercept organ of power, make this organ of power can calculate the telecommunications decruption key, thereby when a call setup, the telecommunications of encrypting can be transmitted to this organ of power's deciphering.
31. one kind is transmitted the method for data at one between by second terminal of one second network service on the basis end-to-end security personnel by first terminal of one first network service and one, described method comprises:
One first authentication and key are decided through consultation subprogram, relate to the specified home operator of one first class value from first terminal sent to first network and draw at least one first encryption parameter that first terminal will be used according to first class value;
One second authentication and key are decided through consultation subprogram, relate to the specified home operator of one second class value from second terminal sent to second net and draw at least one second encryption parameter that second terminal will be used according to second class value;
A cipher key change subprogram relates to one first interaction parameter is sent to second terminal and one second interaction parameter is sent to first terminal from second terminal from first terminal; And
A stage of communication, this stage first terminal and second terminal by one in first terminal according to described at least one first encryption parameter and described second interaction parameter with in second terminal according to the exchange message that is connected of described at least one second encryption parameter and the described first interaction parameter End to End Encryption.
32. one kind is transmitted the method for data according to claim 31, it is characterized in that at least that in first network one of them intercepts the information exchange between first terminal and second terminal according to second encryption parameter and first interaction parameter according to first encryption parameter and second interaction parameter with in second network.
33. one kind is transmitted the system of data according to end-to-end ensuring safety between first and second terminals, described system comprises:
One is first network of first Terminal Service;
One is second network of second Terminal Service;
First network has one to the specified home operator of first terminal and the interface of second network, and second network has one to the specified home operator of second terminal and the interface of first network, and
At least one is stored in the Lawful intercept database of any interaction parameter of setting up between the described terminal that exchanges during end-to-end security personnel connect between first terminal and second terminal, one of them can insert described at least one Lawful intercept database from least the first network and second network.
34. one kind according to end-to-end security personnel is transmitted the communication node of data by first terminal of one first network service and one between by second terminal of one second network service at one, it is characterized in that described node comprises:
One first ciphering unit is used for the specified home operator of one first class value from first terminal sent to first network and draw at least one first encryption parameter that first terminal will be used according to first class value;
One second ciphering unit is used for the specified home operator of one second class value from second terminal sent to second network and draw at least one second encryption parameter that second terminal will be used according to second class value; And
A cipher key change unit is used for one first interaction parameter is sent to second terminal and one second interaction parameter is sent to first terminal from second terminal from first terminal.
35. one kind is transmitted the terminal of data with at least one other-end on end-to-end security personnel's basis, described terminal is by one first network service, and described at least one other-end is by one second network service, and the feature of described terminal is that it comprises:
One first ciphering unit is used for to one first class value of specified home operator request of first terminal and receives at least one first encryption parameter;
A cipher key change unit is used for one first interaction parameter is sent to described at least one other-end and receives one second interaction parameter from described at least one other-end; And
A data transceiver was used for by being connected and described at least one other-end exchange message according to described at least one first encryption parameter and the described second interaction parameter End to End Encryption.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0129339A GB2376392B (en) | 2001-12-07 | 2001-12-07 | Legal interception of IP traffic |
GB0129339.8 | 2001-12-07 | ||
SE01042837 | 2001-12-18 | ||
SE0104283A SE0104283D0 (en) | 2001-12-18 | 2001-12-18 | Secure Communication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1602611A true CN1602611A (en) | 2005-03-30 |
CN100592731C CN100592731C (en) | 2010-02-24 |
Family
ID=26246847
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN02824452.4A Expired - Fee Related CN100592731C (en) | 2001-12-07 | 2002-12-06 | Lawful interception of end-to-end encrypted data traffic |
Country Status (5)
Country | Link |
---|---|
US (1) | US7382881B2 (en) |
EP (1) | EP1452000A2 (en) |
CN (1) | CN100592731C (en) |
AU (1) | AU2002361050A1 (en) |
WO (1) | WO2003049357A2 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102106132A (en) * | 2008-07-24 | 2011-06-22 | 爱立信电话股份有限公司 | Lawful interception for targets in a proxy mobile internet protocol network |
CN101189849B (en) * | 2005-05-31 | 2011-10-05 | 艾利森电话股份有限公司 | Lawful interception method and architecture for transparent transmission of interception information |
CN101523851B (en) * | 2006-10-02 | 2012-10-24 | 艾利森电话股份有限公司 | Lawful interception in wireline broadband networks |
CN103493427A (en) * | 2011-04-22 | 2014-01-01 | 阿尔卡特朗讯公司 | Discovery of security associations |
CN103546442A (en) * | 2012-07-17 | 2014-01-29 | 中兴通讯股份有限公司 | Communication monitoring method and communication monitoring device for browsers |
CN104604275A (en) * | 2012-09-03 | 2015-05-06 | 阿尔卡特朗讯公司 | Smart card personnalization with local generation of keys |
CN102016938B (en) * | 2008-08-08 | 2015-07-01 | 巴特尔能源联合有限责任公司 | Wireless device monitoring systems and monitoring devices, and associated methods |
CN105379175A (en) * | 2013-06-24 | 2016-03-02 | 黑莓有限公司 | Securing method for lawful interception |
WO2017143521A1 (en) * | 2016-02-23 | 2017-08-31 | 华为技术有限公司 | Secure communication method and core network node |
CN111448778A (en) * | 2017-12-14 | 2020-07-24 | 瑞典爱立信有限公司 | Secure next hop communications |
WO2022017158A1 (en) * | 2020-07-22 | 2022-01-27 | 大唐移动通信设备有限公司 | Security management method, apparatus and device between user and multiple terminals |
Families Citing this family (245)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9100457B2 (en) * | 2001-03-28 | 2015-08-04 | Qualcomm Incorporated | Method and apparatus for transmission framing in a wireless communication system |
US8077679B2 (en) * | 2001-03-28 | 2011-12-13 | Qualcomm Incorporated | Method and apparatus for providing protocol options in a wireless communication system |
US8121296B2 (en) * | 2001-03-28 | 2012-02-21 | Qualcomm Incorporated | Method and apparatus for security in a data processing system |
DE60239926D1 (en) * | 2001-03-28 | 2011-06-16 | Qualcomm Inc | PERFORMANCE CONTROL FOR POINT-TO-MULTIPORT SERVICES IN COMMUNICATION SYSTEMS |
US20040120527A1 (en) * | 2001-08-20 | 2004-06-24 | Hawkes Philip Michael | Method and apparatus for security in a data processing system |
US7697523B2 (en) * | 2001-10-03 | 2010-04-13 | Qualcomm Incorporated | Method and apparatus for data packet transport in a wireless communication system using an internet protocol |
US7352868B2 (en) * | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
US7649829B2 (en) * | 2001-10-12 | 2010-01-19 | Qualcomm Incorporated | Method and system for reduction of decoding complexity in a communication system |
AU2002228018A1 (en) * | 2001-12-21 | 2003-07-09 | Nokia Corporation | Intercepting a call connection to a mobile subscriber roaming in a visited plmn (vplmn) |
US7139565B2 (en) * | 2002-01-08 | 2006-11-21 | Seven Networks, Inc. | Connection architecture for a mobile network |
US7885896B2 (en) | 2002-07-09 | 2011-02-08 | Avaya Inc. | Method for authorizing a substitute software license server |
US8041642B2 (en) | 2002-07-10 | 2011-10-18 | Avaya Inc. | Predictive software license balancing |
ES2229073T3 (en) * | 2002-08-08 | 2005-04-16 | Alcatel | LEGAL INTERCEPTATION OF VOIP CALLS ON IP-BASED NETWORKS. |
US7707116B2 (en) * | 2002-08-30 | 2010-04-27 | Avaya Inc. | Flexible license file feature controls |
US7698225B2 (en) * | 2002-08-30 | 2010-04-13 | Avaya Inc. | License modes in call processing |
US7681245B2 (en) * | 2002-08-30 | 2010-03-16 | Avaya Inc. | Remote feature activator feature extraction |
US7966520B2 (en) | 2002-08-30 | 2011-06-21 | Avaya Inc. | Software licensing for spare processors |
US7890997B2 (en) * | 2002-12-26 | 2011-02-15 | Avaya Inc. | Remote feature activation authentication file system |
US7599655B2 (en) * | 2003-01-02 | 2009-10-06 | Qualcomm Incorporated | Method and apparatus for broadcast services in a communication system |
US7917468B2 (en) | 2005-08-01 | 2011-03-29 | Seven Networks, Inc. | Linking of personal information management data |
US8468126B2 (en) | 2005-08-01 | 2013-06-18 | Seven Networks, Inc. | Publishing data in an information community |
US7853563B2 (en) | 2005-08-01 | 2010-12-14 | Seven Networks, Inc. | Universal data aggregation |
DE10307403B4 (en) * | 2003-02-20 | 2008-01-24 | Siemens Ag | Method for forming and distributing cryptographic keys in a mobile radio system and mobile radio system |
US7260557B2 (en) * | 2003-02-27 | 2007-08-21 | Avaya Technology Corp. | Method and apparatus for license distribution |
AU2003271736A1 (en) | 2003-04-09 | 2004-11-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Lawful interception of multimedia calls |
US8098818B2 (en) * | 2003-07-07 | 2012-01-17 | Qualcomm Incorporated | Secure registration for a multicast-broadcast-multimedia system (MBMS) |
US8718279B2 (en) * | 2003-07-08 | 2014-05-06 | Qualcomm Incorporated | Apparatus and method for a secure broadcast system |
US8724803B2 (en) * | 2003-09-02 | 2014-05-13 | Qualcomm Incorporated | Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system |
AU2004297923B2 (en) * | 2003-11-26 | 2008-07-10 | Cisco Technology, Inc. | Method and apparatus to inline encryption and decryption for a wireless station |
DE10355418B4 (en) * | 2003-11-27 | 2008-04-03 | Siemens Ag | Security module for encrypting a telephone conversation |
US7574600B2 (en) * | 2004-03-24 | 2009-08-11 | Intel Corporation | System and method for combining user and platform authentication in negotiated channel security protocols |
US7535905B2 (en) * | 2004-03-31 | 2009-05-19 | Microsoft Corporation | Signing and validating session initiation protocol routing headers |
US8024476B2 (en) * | 2004-05-21 | 2011-09-20 | Microsoft Corporation | Efficient message routing when using server pools |
JP4710267B2 (en) * | 2004-07-12 | 2011-06-29 | 株式会社日立製作所 | Network system, data relay device, session monitor system, and packet monitor relay device |
WO2006021943A1 (en) * | 2004-08-09 | 2006-03-02 | Nice Systems Ltd. | Apparatus and method for multimedia content based |
US7746853B2 (en) * | 2004-08-16 | 2010-06-29 | Cisco Technology, Inc. | Method and apparatus for transporting broadcast video over a packet network including providing conditional access |
US7707405B1 (en) | 2004-09-21 | 2010-04-27 | Avaya Inc. | Secure installation activation |
US8229858B1 (en) | 2004-09-30 | 2012-07-24 | Avaya Inc. | Generation of enterprise-wide licenses in a customer environment |
US7747851B1 (en) | 2004-09-30 | 2010-06-29 | Avaya Inc. | Certificate distribution via license files |
US8010082B2 (en) | 2004-10-20 | 2011-08-30 | Seven Networks, Inc. | Flexible billing architecture |
US7441271B2 (en) * | 2004-10-20 | 2008-10-21 | Seven Networks | Method and apparatus for intercepting events in a communication system |
US7706781B2 (en) | 2004-11-22 | 2010-04-27 | Seven Networks International Oy | Data security in a mobile e-mail service |
FI117152B (en) | 2004-12-03 | 2006-06-30 | Seven Networks Internat Oy | E-mail service provisioning method for mobile terminal, involves using domain part and further parameters to generate new parameter set in list of setting parameter sets, if provisioning of e-mail service is successful |
US7626980B1 (en) * | 2004-12-22 | 2009-12-01 | At&T Corp. | Method and apparatus for enabling communications assistance for law enforcement act services |
CN100574185C (en) | 2005-01-07 | 2009-12-23 | 华为技术有限公司 | The method that in the IP multimedia service subsystem network, ensures media stream safety |
DE102005004612A1 (en) * | 2005-02-01 | 2006-08-10 | Siemens Ag | Method for connecting to encrypted communication links in a packet-oriented network |
US7752633B1 (en) * | 2005-03-14 | 2010-07-06 | Seven Networks, Inc. | Cross-platform event engine |
US7796742B1 (en) | 2005-04-21 | 2010-09-14 | Seven Networks, Inc. | Systems and methods for simplified provisioning |
US8438633B1 (en) | 2005-04-21 | 2013-05-07 | Seven Networks, Inc. | Flexible real-time inbox access |
US20060288423A1 (en) * | 2005-06-17 | 2006-12-21 | Nokia Corporation | Method, system and network elements for establishing media protection over networks |
WO2006136660A1 (en) | 2005-06-21 | 2006-12-28 | Seven Networks International Oy | Maintaining an ip connection in a mobile network |
US7730309B2 (en) * | 2005-07-27 | 2010-06-01 | Zimmermann Philip R | Method and system for key management in voice over internet protocol |
US8069166B2 (en) | 2005-08-01 | 2011-11-29 | Seven Networks, Inc. | Managing user-to-user contact with inferred presence information |
GB0517592D0 (en) | 2005-08-25 | 2005-10-05 | Vodafone Plc | Data transmission |
US7814023B1 (en) * | 2005-09-08 | 2010-10-12 | Avaya Inc. | Secure download manager |
US7725709B2 (en) * | 2005-09-09 | 2010-05-25 | Telefonaktiebolaget L M Ericsson (Publ) | Methods for secure and bandwidth efficient cryptographic synchronization |
US8379858B2 (en) * | 2005-09-16 | 2013-02-19 | International Business Machines Corporation | Generating key information for mutual access among multiple computers |
FR2895177B1 (en) * | 2005-12-20 | 2008-06-13 | Eads Telecom Soc Par Actions S | SHARING A SECRET ELEMENT |
US8024785B2 (en) * | 2006-01-16 | 2011-09-20 | International Business Machines Corporation | Method and data processing system for intercepting communication between a client and a service |
US7769395B2 (en) | 2006-06-20 | 2010-08-03 | Seven Networks, Inc. | Location-based operations and messaging |
US11405846B2 (en) | 2006-03-02 | 2022-08-02 | Tango Networks, Inc. | Call flow system and method for use in a legacy telecommunication system |
US7903635B2 (en) | 2006-03-02 | 2011-03-08 | Tango Networks, Inc. | System and method for enabling DTMF detection in a VoIP network |
US8023479B2 (en) * | 2006-03-02 | 2011-09-20 | Tango Networks, Inc. | Mobile application gateway for connecting devices on a cellular network with individual enterprise and data networks |
US7890096B2 (en) | 2006-03-02 | 2011-02-15 | Tango Networks, Inc. | System and method for enabling call originations using SMS and hotline capabilities |
WO2007106620A2 (en) * | 2006-03-10 | 2007-09-20 | Motorola, Inc. | Method for authenticating a mobile node in a communication network |
US9106409B2 (en) | 2006-03-28 | 2015-08-11 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for handling keys used for encryption and integrity |
PT1999930T (en) * | 2006-03-28 | 2017-04-07 | ERICSSON TELEFON AB L M (publ) | A method and apparatus for handling keys used for encryption and integrity |
US20080001717A1 (en) * | 2006-06-20 | 2008-01-03 | Trevor Fiatal | System and method for group management |
US8934609B2 (en) * | 2006-06-21 | 2015-01-13 | Genband Us Llc | Method and apparatus for identifying and monitoring VoIP media plane security keys for service provider lawful intercept use |
CN101110758A (en) * | 2006-07-21 | 2008-01-23 | 华为技术有限公司 | Method and system for establishing emergency conversation and proxy function of controlling call conversation |
DE102006046017B4 (en) * | 2006-09-28 | 2010-01-14 | Siemens Ag | A method for providing a symmetric key for securing a key management protocol |
US8418241B2 (en) * | 2006-11-14 | 2013-04-09 | Broadcom Corporation | Method and system for traffic engineering in secured networks |
US20080111977A1 (en) * | 2006-11-14 | 2008-05-15 | Asml Holding N.V. | Compensation techniques for fluid and magnetic bearings |
US8599747B1 (en) * | 2006-12-20 | 2013-12-03 | Radisys Canada Inc. | Lawful interception of real time packet data |
US20080195740A1 (en) * | 2007-02-12 | 2008-08-14 | Mobitv, Inc. | Maintaining session state information in a client server system |
US8805425B2 (en) | 2007-06-01 | 2014-08-12 | Seven Networks, Inc. | Integrated messaging |
US8693494B2 (en) | 2007-06-01 | 2014-04-08 | Seven Networks, Inc. | Polling |
US20100046516A1 (en) * | 2007-06-26 | 2010-02-25 | Media Patents, S.L. | Methods and Devices for Managing Multicast Traffic |
ES2358546T3 (en) * | 2007-06-26 | 2011-05-11 | Media Patents, S. L. | ROUTER TO MANAGE MULTICAST GROUPS. |
US8533611B2 (en) * | 2009-08-10 | 2013-09-10 | Voxer Ip Llc | Browser enabled communication device for conducting conversations in either a real-time mode, a time-shifted mode, and with the ability to seamlessly shift the conversation between the two modes |
US8645477B2 (en) * | 2009-01-30 | 2014-02-04 | Voxer Ip Llc | Progressive messaging apparatus and method capable of supporting near real-time communication |
US8688789B2 (en) * | 2009-01-30 | 2014-04-01 | Voxer Ip Llc | Progressive messaging apparatus and method capable of supporting near real-time communication |
US9178916B2 (en) | 2007-06-28 | 2015-11-03 | Voxer Ip Llc | Real-time messaging method and apparatus |
US11095583B2 (en) | 2007-06-28 | 2021-08-17 | Voxer Ip Llc | Real-time messaging method and apparatus |
US20100198988A1 (en) * | 2009-01-30 | 2010-08-05 | Rebelvox Llc | Methods for using the addressing, protocols and the infrastructure of email to support near real-time communication |
US8825772B2 (en) | 2007-06-28 | 2014-09-02 | Voxer Ip Llc | System and method for operating a server for real-time communication of time-based media |
US8180029B2 (en) | 2007-06-28 | 2012-05-15 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US20110019662A1 (en) | 2007-06-28 | 2011-01-27 | Rebelvox Llc | Method for downloading and using a communication application through a web browser |
US8644153B2 (en) * | 2007-07-31 | 2014-02-04 | Cisco Technology, Inc. | Infrastructure for mediation device to mediation device communication |
US9456009B2 (en) * | 2007-08-03 | 2016-09-27 | Centurylink Intellectual Property Llc | Method and apparatus for securely transmitting lawfully intercepted VOIP data |
US9198033B2 (en) * | 2007-09-27 | 2015-11-24 | Alcatel Lucent | Method and apparatus for authenticating nodes in a wireless network |
EP2045991A1 (en) * | 2007-10-04 | 2009-04-08 | Nokia Siemens Networks Oy | Method and device for processing data and communication system comprising such device |
EP2213042A1 (en) * | 2007-10-15 | 2010-08-04 | Media Patents, S. L. | Method for managing multicast traffic in a data network and network equipment using said method |
US8064449B2 (en) * | 2007-10-15 | 2011-11-22 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic |
US20090277226A1 (en) * | 2007-10-16 | 2009-11-12 | Santangelo Salvatore R | Modular melter |
US8145780B2 (en) | 2007-10-19 | 2012-03-27 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US20090103529A1 (en) * | 2007-10-19 | 2009-04-23 | Rebelvox, Llc | Telecommunication and multimedia management method and apparatus |
US8699383B2 (en) * | 2007-10-19 | 2014-04-15 | Voxer Ip Llc | Method and apparatus for real-time synchronization of voice communications |
US8233598B2 (en) * | 2007-10-19 | 2012-07-31 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8250181B2 (en) * | 2007-10-19 | 2012-08-21 | Voxer Ip Llc | Method and apparatus for near real-time synchronization of voice communications |
US7751362B2 (en) * | 2007-10-19 | 2010-07-06 | Rebelvox Llc | Graceful degradation for voice communication services over wired and wireless networks |
US8391312B2 (en) | 2007-10-19 | 2013-03-05 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US7751361B2 (en) * | 2007-10-19 | 2010-07-06 | Rebelvox Llc | Graceful degradation for voice communication services over wired and wireless networks |
US8090867B2 (en) | 2007-10-19 | 2012-01-03 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8782274B2 (en) * | 2007-10-19 | 2014-07-15 | Voxer Ip Llc | Method and system for progressively transmitting a voice message from sender to recipients across a distributed services communication network |
US8706907B2 (en) | 2007-10-19 | 2014-04-22 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8380874B2 (en) | 2007-10-19 | 2013-02-19 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8099512B2 (en) * | 2007-10-19 | 2012-01-17 | Voxer Ip Llc | Method and system for real-time synchronization across a distributed services communication network |
US8001261B2 (en) * | 2007-10-19 | 2011-08-16 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8682336B2 (en) * | 2007-10-19 | 2014-03-25 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8111713B2 (en) * | 2007-10-19 | 2012-02-07 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8559319B2 (en) * | 2007-10-19 | 2013-10-15 | Voxer Ip Llc | Method and system for real-time synchronization across a distributed services communication network |
US8699678B2 (en) | 2007-10-19 | 2014-04-15 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8321581B2 (en) * | 2007-10-19 | 2012-11-27 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
WO2009056175A1 (en) * | 2007-10-30 | 2009-05-07 | Soporte Multivendor S.L. | Method for managing multicast traffic between routers communicating by means of a protocol integrating the pim protocol; and router and switch involved in said method |
KR100852146B1 (en) * | 2007-11-21 | 2008-08-13 | 한국정보보호진흥원 | System and method for lawful interception using trusted third parties in voip secure communications |
US8364181B2 (en) | 2007-12-10 | 2013-01-29 | Seven Networks, Inc. | Electronic-mail filtering for mobile devices |
US9002828B2 (en) | 2007-12-13 | 2015-04-07 | Seven Networks, Inc. | Predictive content delivery |
US8793305B2 (en) | 2007-12-13 | 2014-07-29 | Seven Networks, Inc. | Content delivery to a mobile device from a content service |
US8199916B2 (en) * | 2007-12-26 | 2012-06-12 | International Business Machines Corporation | Selectively loading security enforcement points with security association information |
US8682470B2 (en) | 2008-01-08 | 2014-03-25 | International Business Machines Corporation | Data storage drive with target of opportunity recognition |
US9349410B2 (en) | 2008-01-08 | 2016-05-24 | International Business Machines Corporation | Automated data storage library with target of opportunity recognition |
US9495561B2 (en) * | 2008-01-08 | 2016-11-15 | International Business Machines Corporation | Target of opportunity recognition during an encryption related process |
US8107921B2 (en) | 2008-01-11 | 2012-01-31 | Seven Networks, Inc. | Mobile virtual network operator |
US8862657B2 (en) | 2008-01-25 | 2014-10-14 | Seven Networks, Inc. | Policy based content service |
US20090193338A1 (en) | 2008-01-28 | 2009-07-30 | Trevor Fiatal | Reducing network and battery consumption during content delivery and playback |
US9031068B2 (en) * | 2008-02-01 | 2015-05-12 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic through a switch |
WO2009095041A1 (en) * | 2008-02-01 | 2009-08-06 | Soporte Multivendor S.L. | Method for managing multicast traffic through a switch operating in the layer 2 of the osi model, and router and switch involved in said method |
US9054912B2 (en) | 2008-02-08 | 2015-06-09 | Voxer Ip Llc | Communication application for conducting conversations including multiple media types in either a real-time mode or a time-shifted mode |
US8321582B2 (en) | 2008-02-08 | 2012-11-27 | Voxer Ip Llc | Communication application for conducting conversations including multiple media types in either a real-time mode or a time-shifted mode |
US8542804B2 (en) | 2008-02-08 | 2013-09-24 | Voxer Ip Llc | Voice and text mail application for communication devices |
WO2009109684A1 (en) * | 2008-03-05 | 2009-09-11 | Media Patents, S. L. | Method for monitoring or managing devices connected to a data network |
US8401582B2 (en) * | 2008-04-11 | 2013-03-19 | Voxer Ip Llc | Time-shifting for push to talk voice communication systems |
JP4966432B2 (en) * | 2008-04-11 | 2012-07-04 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | Access via non-3GPP access network |
CN101572694B (en) * | 2008-04-29 | 2012-09-05 | 华为技术有限公司 | Method for acquiring media stream key, session equipment and key management function entity |
DE102008026625A1 (en) * | 2008-06-03 | 2009-12-10 | Siemens Aktiengesellschaft | Arrangement and method for transmitting media data |
US8787947B2 (en) | 2008-06-18 | 2014-07-22 | Seven Networks, Inc. | Application discovery on mobile devices |
US8078158B2 (en) | 2008-06-26 | 2011-12-13 | Seven Networks, Inc. | Provisioning applications for a mobile device |
US9659188B2 (en) | 2008-08-14 | 2017-05-23 | Invention Science Fund I, Llc | Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving use |
US8626848B2 (en) * | 2008-08-14 | 2014-01-07 | The Invention Science Fund I, Llc | Obfuscating identity of a source entity affiliated with a communiqué in accordance with conditional directive provided by a receiving entity |
US20110107427A1 (en) * | 2008-08-14 | 2011-05-05 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué |
US20110093806A1 (en) * | 2008-08-14 | 2011-04-21 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Obfuscating reception of communiqué affiliated with a source entity |
US20110081018A1 (en) * | 2008-08-14 | 2011-04-07 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Obfuscating reception of communiqué affiliated with a source entity |
US20100042669A1 (en) * | 2008-08-14 | 2010-02-18 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | System and method for modifying illusory user identification characteristics |
US8850044B2 (en) * | 2008-08-14 | 2014-09-30 | The Invention Science Fund I, Llc | Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity |
US20110131409A1 (en) * | 2008-08-14 | 2011-06-02 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué |
US20110166972A1 (en) * | 2008-08-14 | 2011-07-07 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Conditionally obfuscating one or more secret entities with respect to one or more billing statements |
US8583553B2 (en) * | 2008-08-14 | 2013-11-12 | The Invention Science Fund I, Llc | Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities |
US20110161217A1 (en) * | 2008-08-14 | 2011-06-30 | Searete Llc | Conditionally obfuscating one or more secret entities with respect to one or more billing statements |
US20110110518A1 (en) * | 2008-08-14 | 2011-05-12 | Searete Llc | Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué |
US9641537B2 (en) * | 2008-08-14 | 2017-05-02 | Invention Science Fund I, Llc | Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects |
US8929208B2 (en) * | 2008-08-14 | 2015-01-06 | The Invention Science Fund I, Llc | Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects |
US20100042667A1 (en) * | 2008-08-14 | 2010-02-18 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | System and method for transmitting illusory identification characteristics |
US20100318595A1 (en) * | 2008-08-14 | 2010-12-16 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | System and method for conditionally transmitting one or more locum tenentes |
US20110166973A1 (en) * | 2008-08-14 | 2011-07-07 | Searete Llc | Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities |
US8730836B2 (en) * | 2008-08-14 | 2014-05-20 | The Invention Science Fund I, Llc | Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué |
US20110041185A1 (en) * | 2008-08-14 | 2011-02-17 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving user |
US8325662B2 (en) * | 2008-09-17 | 2012-12-04 | Voxer Ip Llc | Apparatus and method for enabling communication when network connectivity is reduced or lost during a conversation and for resuming the conversation when connectivity improves |
US7958233B2 (en) * | 2008-09-26 | 2011-06-07 | Media Patents, S.L. | Method for lawfully intercepting communication IP packets exchanged between terminals |
US8909759B2 (en) | 2008-10-10 | 2014-12-09 | Seven Networks, Inc. | Bandwidth measurement |
US8270950B2 (en) * | 2008-12-05 | 2012-09-18 | Voxer Ip Llc | Mobile communication device, method, and system for reducing exposure to radio frequency energy during transmissions by transmitting media in/out while the mobile communication device is safe distance away from user |
US8849927B2 (en) | 2009-01-30 | 2014-09-30 | Voxer Ip Llc | Method for implementing real-time voice messaging on a server node |
US9357065B2 (en) | 2009-03-18 | 2016-05-31 | Centurylink Intellectual Property Llc | System, method and apparatus for transmitting audio signals over a voice channel |
US8588410B2 (en) * | 2009-04-06 | 2013-11-19 | Elster Electricity, Llc | Simplified secure symmetrical key management |
US8189584B2 (en) * | 2009-07-27 | 2012-05-29 | Media Patents, S. L. | Multicast traffic management in a network interface |
KR101289888B1 (en) * | 2009-12-15 | 2013-07-24 | 한국전자통신연구원 | Method and terminal for lawful interception |
US20110149960A1 (en) * | 2009-12-17 | 2011-06-23 | Media Patents, S.L. | Method and apparatus for filtering multicast packets |
US8509438B2 (en) * | 2010-01-29 | 2013-08-13 | Elster Solutions Llc | Key management in a wireless network using primary and secondary keys |
US8990315B2 (en) * | 2010-03-09 | 2015-03-24 | International Business Machines Corporation | Sending messages with limited awareness of recipients |
TW201209697A (en) | 2010-03-30 | 2012-03-01 | Michael Luna | 3D mobile user interface with configurable workspace management |
US8340292B1 (en) * | 2010-04-01 | 2012-12-25 | Sprint Communications Company L.P. | Lawful intercept management by an authorization system |
CN102316450B (en) * | 2010-06-29 | 2014-01-22 | 上海贝尔股份有限公司 | Group-based M2M (machine-to-machine) communication authentication method and equipment |
US8838783B2 (en) | 2010-07-26 | 2014-09-16 | Seven Networks, Inc. | Distributed caching for resource and mobile network traffic management |
WO2012018477A2 (en) | 2010-07-26 | 2012-02-09 | Seven Networks, Inc. | Distributed implementation of dynamic wireless traffic policy |
CA2806557C (en) | 2010-07-26 | 2014-10-07 | Michael Luna | Mobile application traffic optimization |
EP3407673B1 (en) | 2010-07-26 | 2019-11-20 | Seven Networks, LLC | Mobile network traffic coordination across multiple applications |
US8166164B1 (en) | 2010-11-01 | 2012-04-24 | Seven Networks, Inc. | Application and network-based long poll request detection and cacheability assessment therefor |
US8903954B2 (en) | 2010-11-22 | 2014-12-02 | Seven Networks, Inc. | Optimization of resource polling intervals to satisfy mobile device requests |
US9060032B2 (en) | 2010-11-01 | 2015-06-16 | Seven Networks, Inc. | Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic |
US8843153B2 (en) | 2010-11-01 | 2014-09-23 | Seven Networks, Inc. | Mobile traffic categorization and policy for network use optimization while preserving user experience |
WO2012060996A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Caching adapted for mobile application behavior and network conditions |
US9330196B2 (en) | 2010-11-01 | 2016-05-03 | Seven Networks, Llc | Wireless traffic management system cache optimization using http headers |
US8204953B2 (en) | 2010-11-01 | 2012-06-19 | Seven Networks, Inc. | Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache |
WO2012061430A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed management of keep-alive message signaling for mobile network resource conservation and optimization |
US8484314B2 (en) | 2010-11-01 | 2013-07-09 | Seven Networks, Inc. | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
WO2012060995A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
WO2012071283A1 (en) | 2010-11-22 | 2012-05-31 | Michael Luna | Aligning data transfer to optimize connections established for transmission over a wireless network |
KR101776928B1 (en) * | 2010-12-21 | 2017-09-29 | 한국전자통신연구원 | Apparatus and method for lawful interception |
WO2012094675A2 (en) | 2011-01-07 | 2012-07-12 | Seven Networks, Inc. | System and method for reduction of mobile network traffic used for domain name system (dns) queries |
EP2700021A4 (en) | 2011-04-19 | 2016-07-20 | Seven Networks Llc | Shared resource and virtual resource management in a networked environment |
US8621075B2 (en) | 2011-04-27 | 2013-12-31 | Seven Metworks, Inc. | Detecting and preserving state for satisfying application requests in a distributed proxy and cache system |
GB2493473B (en) | 2011-04-27 | 2013-06-19 | Seven Networks Inc | System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief |
US8644510B2 (en) * | 2011-05-11 | 2014-02-04 | Alcatel Lucent | Discovery of security associations for key management relying on public keys |
IL214142A (en) * | 2011-07-18 | 2016-06-30 | Verint Systems Ltd | System and method for location of wireless communication terminals using application-level location data |
WO2013015994A1 (en) | 2011-07-27 | 2013-01-31 | Seven Networks, Inc. | Monitoring mobile application activities for malicious traffic on a mobile device |
US8934414B2 (en) | 2011-12-06 | 2015-01-13 | Seven Networks, Inc. | Cellular or WiFi mobile traffic optimization based on public or private network destination |
EP2789138B1 (en) | 2011-12-06 | 2016-09-14 | Seven Networks, LLC | A mobile device and method to utilize the failover mechanisms for fault tolerance provided for mobile traffic management and network/device resource conservation |
US9277443B2 (en) | 2011-12-07 | 2016-03-01 | Seven Networks, Llc | Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol |
GB2498064A (en) | 2011-12-07 | 2013-07-03 | Seven Networks Inc | Distributed content caching mechanism using a network operator proxy |
US8861354B2 (en) | 2011-12-14 | 2014-10-14 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
EP2792188B1 (en) | 2011-12-14 | 2019-03-20 | Seven Networks, LLC | Mobile network reporting and usage analytics system and method using aggregation of data in a distributed traffic optimization system |
US9832095B2 (en) | 2011-12-14 | 2017-11-28 | Seven Networks, Llc | Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic |
US8909202B2 (en) | 2012-01-05 | 2014-12-09 | Seven Networks, Inc. | Detection and management of user interactions with foreground applications on a mobile device in distributed caching |
EP2803162B1 (en) | 2012-01-12 | 2020-04-15 | BlackBerry Limited | System and method of lawful access to secure communications |
US9413530B2 (en) * | 2012-01-12 | 2016-08-09 | Blackberry Limited | System and method of lawful access to secure communications |
WO2013104070A1 (en) * | 2012-01-12 | 2013-07-18 | Research In Motion Limited | System and method of lawful access to secure communications |
US8914629B2 (en) | 2012-01-30 | 2014-12-16 | The Nielsen Company (Us), Llc | Intercepting encrypted network traffic for internet usage monitoring |
WO2013116856A1 (en) | 2012-02-02 | 2013-08-08 | Seven Networks, Inc. | Dynamic categorization of applications for network access in a mobile network |
US9326189B2 (en) | 2012-02-03 | 2016-04-26 | Seven Networks, Llc | User as an end point for profiling and optimizing the delivery of content and data in a wireless network |
GB201202058D0 (en) * | 2012-02-07 | 2012-03-21 | Ericsson Telefon Ab L M | Lawful interception of encrypted communications |
US8812695B2 (en) | 2012-04-09 | 2014-08-19 | Seven Networks, Inc. | Method and system for management of a virtual network connection without heartbeat messages |
WO2013155208A1 (en) | 2012-04-10 | 2013-10-17 | Seven Networks, Inc. | Intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network |
TW201409986A (en) * | 2012-06-04 | 2014-03-01 | Interdigital Patent Holdings | Lawful interception for local selected IP traffic offload and local IP access performed at a non-core gateway |
WO2014011216A1 (en) | 2012-07-13 | 2014-01-16 | Seven Networks, Inc. | Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications |
CN103685181A (en) * | 2012-09-13 | 2014-03-26 | 北京大唐高鸿软件技术有限公司 | Key negotiation method based on SRTP |
US9161258B2 (en) | 2012-10-24 | 2015-10-13 | Seven Networks, Llc | Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion |
US8898769B2 (en) | 2012-11-16 | 2014-11-25 | At&T Intellectual Property I, Lp | Methods for provisioning universal integrated circuit cards |
US8959331B2 (en) | 2012-11-19 | 2015-02-17 | At&T Intellectual Property I, Lp | Systems for provisioning universal integrated circuit cards |
US9307493B2 (en) | 2012-12-20 | 2016-04-05 | Seven Networks, Llc | Systems and methods for application management of mobile device radio state promotion and demotion |
US9241314B2 (en) | 2013-01-23 | 2016-01-19 | Seven Networks, Llc | Mobile device with application or context aware fast dormancy |
US8874761B2 (en) | 2013-01-25 | 2014-10-28 | Seven Networks, Inc. | Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols |
WO2014122502A1 (en) * | 2013-02-07 | 2014-08-14 | Nokia Corporation | Method for enabling lawful interception by providing security information. |
US9230081B2 (en) | 2013-03-05 | 2016-01-05 | Intel Corporation | User authorization and presence detection in isolation from interference from and control by host central processing unit and operating system |
US8750123B1 (en) | 2013-03-11 | 2014-06-10 | Seven Networks, Inc. | Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network |
KR101764197B1 (en) | 2013-06-27 | 2017-08-02 | 인텔 코포레이션 | Continuous multi-factor authentication |
US9065765B2 (en) | 2013-07-22 | 2015-06-23 | Seven Networks, Inc. | Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network |
US9036820B2 (en) | 2013-09-11 | 2015-05-19 | At&T Intellectual Property I, Lp | System and methods for UICC-based secure communication |
US9124573B2 (en) | 2013-10-04 | 2015-09-01 | At&T Intellectual Property I, Lp | Apparatus and method for managing use of secure tokens |
TWI526042B (en) * | 2013-10-16 | 2016-03-11 | 緯創資通股份有限公司 | Communication system, mobile communication apparatus and switching method of user identification information |
US9208300B2 (en) | 2013-10-23 | 2015-12-08 | At&T Intellectual Property I, Lp | Apparatus and method for secure authentication of a communication device |
US9240994B2 (en) | 2013-10-28 | 2016-01-19 | At&T Intellectual Property I, Lp | Apparatus and method for securely managing the accessibility to content and applications |
US9240989B2 (en) | 2013-11-01 | 2016-01-19 | At&T Intellectual Property I, Lp | Apparatus and method for secure over the air programming of a communication device |
US9313660B2 (en) | 2013-11-01 | 2016-04-12 | At&T Intellectual Property I, Lp | Apparatus and method for secure provisioning of a communication device |
US9413759B2 (en) | 2013-11-27 | 2016-08-09 | At&T Intellectual Property I, Lp | Apparatus and method for secure delivery of data from a communication device |
US9713006B2 (en) | 2014-05-01 | 2017-07-18 | At&T Intellectual Property I, Lp | Apparatus and method for managing security domains for a universal integrated circuit card |
US10326803B1 (en) | 2014-07-30 | 2019-06-18 | The University Of Tulsa | System, method and apparatus for network security monitoring, information sharing, and collective intelligence |
KR102507113B1 (en) * | 2015-07-06 | 2023-03-07 | 삼성전자주식회사 | Method, Appratus and System of Monitoring Supporting for Encrypted Communication Session |
US10073964B2 (en) | 2015-09-25 | 2018-09-11 | Intel Corporation | Secure authentication protocol systems and methods |
US10237305B2 (en) | 2016-02-17 | 2019-03-19 | Nagravision S.A. | Methods and systems for enabling legal-intercept mode for a targeted secure element |
CN105743914B (en) * | 2016-03-31 | 2019-03-22 | 宇龙计算机通信科技(深圳)有限公司 | A kind of voice encryption communication means, calling terminal, called end and system |
EP3598694A4 (en) | 2017-03-17 | 2020-03-11 | Nec Corporation | Authentication device, network device, communication system, authentication method, and non-transitory computer readable medium |
US11218515B2 (en) * | 2017-06-16 | 2022-01-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Media protection within the core network of an IMS network |
WO2020013742A1 (en) * | 2018-07-13 | 2020-01-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Verification of lawful interception data |
EP3629204B1 (en) * | 2018-09-28 | 2021-02-24 | BlackBerry Limited | Processing data on an electronic device |
US12095754B2 (en) * | 2022-04-20 | 2024-09-17 | Bank Of America Corporation | System and method for establishing a secure session to authenticate DNS requests via dynamically configurable trusted network interface controllers |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2176032A1 (en) * | 1994-01-13 | 1995-07-20 | Bankers Trust Company | Cryptographic system and method with key escrow feature |
US6178505B1 (en) * | 1997-03-10 | 2001-01-23 | Internet Dynamics, Inc. | Secure delivery of information in a network |
US6628786B1 (en) * | 1997-09-30 | 2003-09-30 | Sun Microsystems, Inc. | Distributed state random number generator and method for utilizing same |
US6225888B1 (en) * | 1997-12-08 | 2001-05-01 | Nokia Telecommunications Oy | Authentication between communicating parties in a telecommunications network |
-
2002
- 2002-12-06 WO PCT/EP2002/014080 patent/WO2003049357A2/en not_active Application Discontinuation
- 2002-12-06 US US10/497,568 patent/US7382881B2/en not_active Expired - Lifetime
- 2002-12-06 AU AU2002361050A patent/AU2002361050A1/en not_active Abandoned
- 2002-12-06 CN CN02824452.4A patent/CN100592731C/en not_active Expired - Fee Related
- 2002-12-06 EP EP02795154A patent/EP1452000A2/en not_active Withdrawn
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101189849B (en) * | 2005-05-31 | 2011-10-05 | 艾利森电话股份有限公司 | Lawful interception method and architecture for transparent transmission of interception information |
CN101523851B (en) * | 2006-10-02 | 2012-10-24 | 艾利森电话股份有限公司 | Lawful interception in wireline broadband networks |
CN102106132A (en) * | 2008-07-24 | 2011-06-22 | 爱立信电话股份有限公司 | Lawful interception for targets in a proxy mobile internet protocol network |
CN102016938B (en) * | 2008-08-08 | 2015-07-01 | 巴特尔能源联合有限责任公司 | Wireless device monitoring systems and monitoring devices, and associated methods |
CN103493427A (en) * | 2011-04-22 | 2014-01-01 | 阿尔卡特朗讯公司 | Discovery of security associations |
CN103493427B (en) * | 2011-04-22 | 2016-07-06 | 阿尔卡特朗讯公司 | Method and apparatus for the discovery of security association |
CN103546442A (en) * | 2012-07-17 | 2014-01-29 | 中兴通讯股份有限公司 | Communication monitoring method and communication monitoring device for browsers |
CN103546442B (en) * | 2012-07-17 | 2018-10-23 | 中兴通讯股份有限公司 | The communication monitoring method and device of browser |
CN104604275A (en) * | 2012-09-03 | 2015-05-06 | 阿尔卡特朗讯公司 | Smart card personnalization with local generation of keys |
CN104604275B (en) * | 2012-09-03 | 2019-03-22 | 阿尔卡特朗讯公司 | Smart card personalization is carried out using the local key that generates |
CN105379175A (en) * | 2013-06-24 | 2016-03-02 | 黑莓有限公司 | Securing method for lawful interception |
CN105379175B (en) * | 2013-06-24 | 2019-04-05 | 黑莓有限公司 | Safety method for lawful intercept |
US11032324B2 (en) | 2013-06-24 | 2021-06-08 | Blackberry Limited | Securing method for lawful interception |
US11943262B2 (en) | 2013-06-24 | 2024-03-26 | Malikie Innovations Limited | Securing method for lawful interception |
WO2017143521A1 (en) * | 2016-02-23 | 2017-08-31 | 华为技术有限公司 | Secure communication method and core network node |
CN111448778A (en) * | 2017-12-14 | 2020-07-24 | 瑞典爱立信有限公司 | Secure next hop communications |
WO2022017158A1 (en) * | 2020-07-22 | 2022-01-27 | 大唐移动通信设备有限公司 | Security management method, apparatus and device between user and multiple terminals |
Also Published As
Publication number | Publication date |
---|---|
US20050063544A1 (en) | 2005-03-24 |
US7382881B2 (en) | 2008-06-03 |
WO2003049357A2 (en) | 2003-06-12 |
CN100592731C (en) | 2010-02-24 |
EP1452000A2 (en) | 2004-09-01 |
AU2002361050A1 (en) | 2003-06-17 |
WO2003049357A3 (en) | 2003-10-09 |
WO2003049357B1 (en) | 2003-11-27 |
AU2002361050A8 (en) | 2003-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100592731C (en) | Lawful interception of end-to-end encrypted data traffic | |
US9628271B2 (en) | Key management for secure communication | |
AU2009294815B2 (en) | Key management in a communication network | |
US8850203B2 (en) | Secure key management in multimedia communication system | |
US8301883B2 (en) | Secure key management in conferencing system | |
RU2335866C2 (en) | Method of cryptographic key forming and distribution in mobile communication system and corresponding mobile communication system | |
US7813509B2 (en) | Key distribution method | |
CN101635823B (en) | Method and system of terminal for encrypting videoconference data | |
US8875236B2 (en) | Security in communication networks | |
JP2011524136A (en) | Method and apparatus for machine-to-machine communication | |
KR20130140873A (en) | Discovery of security associations for key management relying on public keys | |
Chen et al. | An efficient end-to-end security mechanism for IP multimedia subsystem | |
GB2376392A (en) | Legal interception of encrypted IP traffic | |
GB2390270A (en) | Escrowing with an authority only part of the information required to reconstruct a decryption key | |
JP5746774B2 (en) | Key management for secure communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100224 Termination date: 20161206 |
|
CF01 | Termination of patent right due to non-payment of annual fee |